Blog

Managed File Transfer and Network Solutions

Overview

There are good investments and there are great investments. A piece of software can be a great investment if it makes a substantial impact to business. However, because each type of business has its own peculiarities, the extent of the same software's impact can vary from one business to another. There are those that can benefit immensely and there are those where the same software can make little to no impact at all.

In this post, we identify the types of businesses that can make excellent ROI out of a managed file transfer server acquisition. We hope this will help you determine whether an MFT server can be a great investment for you.

Legislations that involve data protection or privacy always draw our attention because they often have implications to business transactions and file transfers. China's new Cybersecurity Law certainly falls into this category.

Overview

In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of the most widely used file transfer protocols, FTP, fails to meet the security goals of that triad. If you're using FTP in your business operations, it's high time to find an alternative. This post introduces you to some of the top options.

Overview

Most US states now have their own data breach notification law. If your business operations involve the storage and transfer of personal information, there are a couple of things you ought to know to reduce the risks and bring down the costs of compliance.

Overview

Will Brexit have a significant impact on data transfers involving personal information? While it's hard speculate what the impact will be, it could largely depend on the specific path UK chooses to take once its separation from the EU is finalized.

Overview

Results from Ponemon's 2016 Cost of Data Breach Study show that the price of these incidents continues to rise and that it has now breached the $4 Million mark. Another paper published by Deloitte even talks about hidden costs that far exceed what most businesses normally take into account. While these reports paint an alarming picture on the state of data security, we managed to extract from these papers key factors that can help businesses mitigate the risks.

Overview

Some organizations that deal with exceptionally sensitive information need to employ very stringent access restrictions to their internal networks. While a DMZ consisting of firewalls and reverse proxies can, in most cases, meet such requirements, providing network services from the internal network to external clients while also prohibiting inbound connections can be quite challenging. This little reverse proxy enhancement can simplify things.

Overview

When I first read about HSTS, my first reaction was, "What's this? A replacement for HTTPS? Considering the ubiquity of HTTPS, shouldn't we be working to improve it first instead of replacing it?" Turned out, my initial understanding of HTTP Strict Transport Security was off the mark.

Overview

The Trans-Pacific Partnership has drawn a tsunami of reactions both for and against it. For sure, it's going to be a game changer in global trade. But how does it concern us?

Business transactions are now accompanied by massive data exchanges. It's thus expected for the agreement to tackle the conduct of those data exchanges as well. In this post, we take a look at the agreement's provisions on data transfers and try to understand how they might affect current practices.

Overview

As of this writing, the United States and European Union are in the thick of negotiations for a new Safe Harbor agreement. The result can have a profound impact on thousands of global businesses. In this post, we introduce you to the original Safe Harbor, how it came about, why it's been recently invalidated, and the possible impacts its future holds for a large number of businesses.